发布时间 :2002-12-31 00:00:00
修订时间 :2016-10-17 22:27:47

[原文]Cross-site scripting (XSS) vulnerability in the default ASP pages on Microsoft Site Server 3.0 on Windows NT 4.0 allows remote attackers to inject arbitrary web script or HTML via the (1) ctr parameter in Default.asp and (2) the query string to formslogin.asp.

[CNNVD]Microsoft Site Server跨站脚本漏洞(CNNVD-200212-140)

        基于Windows NT 4.0版本的Microsoft Site Server 3.0版本的默认ASP页存在跨站脚本(XSS)漏洞。远程攻击者借助(1)Default.asp的ctr参数和(2)formslogin.asp的查询字符串注入任意web脚本或者HTML。

- CVSS (基础分值)

CVSS分值: 4.3 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/a:microsoft:site_server_commerce:3.0Microsoft Site Server Commerce 3.0
cpe:/o:microsoft:windows_nt:4.0Microsoft Windows NT 4.0
cpe:/a:microsoft:site_server:3.0Microsoft Site Server 3.0

- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  VULNWATCH  20020130 RFP2201: MS Site Server Evilness
(UNKNOWN)  XF  siteserver-asp-css(8050)

- 漏洞信息

Microsoft Site Server跨站脚本漏洞
中危 跨站脚本
2002-12-31 00:00:00 2006-05-01 00:00:00
        基于Windows NT 4.0版本的Microsoft Site Server 3.0版本的默认ASP页存在跨站脚本(XSS)漏洞。远程攻击者借助(1)Default.asp的ctr参数和(2)formslogin.asp的查询字符串注入任意web脚本或者HTML。

- 公告与补丁

        Currently the SecurityFocus staff are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: .

- 漏洞信息 (21260)

Microsoft Site Server 3.0 Cross-Site Scripting Vulnerability (EDBID:21260)
windows remote
2002-01-29 Verified
0 rain forest puppy
N/A [点击下载]

Microsoft Site Server is designed to run on Microsoft Windows NT Server
platforms. It provides a means for users on a corporate intranet to
share, publish, and find information. Site Server Commerce Edition
incorporates the same features as well as providing an interface for
e-commerce sites to interact and conduct business with customers and

Various Microsoft Site Server ASP pages are prone to cross-site scripting attacks. It is possible to create a malicious link to a vulnerable ASP page which contains arbitrary script code. Script code will be executed in the browser of a legitimate user who browses the link, in the context of the Microsoft Site Server site. 

The vulnerable pages require that the legitimate user authenticates before accessing them. 

At the very least this may provide an opportunity for an attacker to steal cookie-based authentication credentials from a legitimate Microsoft Site Server user. 

Default.asp and formslogin.asp are known to be prone to this issue. It has been reported that a number of other ASP pages are also affected.



- 漏洞信息

Microsoft Site Server formslogin.asp url Parameter XSS
Remote / Network Access Input Manipulation
Loss of Integrity Patch / RCS
Exploit Public Third-party Verified

- 漏洞描述

Microsoft Site Server contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'url' parameter upon submission to the formslogin.asp script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

- 时间线

2002-01-29 Unknow
2002-01-29 Unknow

- 解决方案

Currently, there are no known workarounds or upgrades to correct this issue. However, Microsoft has released a patch to address this vulnerability.

- 相关参考

- 漏洞作者